|
|
||||||
![]() |
||||||
![]() |
||||||
![]() |
||||||
|
||||||
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
|
||||||
IIoT Puts Manufacturers In the Sights of CybercriminalsBOULDER CREEK, Calif. — We are seeing a number of attacks both on industrial control systems (ICS) and on the operational technology (OT) side of the industrial IoT (IIoT) with increasing frequency. Why is the IIoT so vulnerable to cyberattacks? We talked to ICS and OT specialists at major cybersecurity solutions providers, as well as key industry analysts, to suss out the answers. The consensus was a list of several elements that have combined to create a perfect storm over the last few years:
Recommended: Real-life Industrial IoT Cyberattack Scenarios Phil Neray, vice president of industrial cybersecurity for CyberX, sees three of these as the key factors that indicate that industrial control/OT systems are more at risk today of experiencing cyberattacks than ever before: “First, most devices and networks used in our industrial control systems were designed 15 or more years ago, when connectivity to the internet was not standard practice and when it was assumed that if you had connectivity to the device, you had permission to configure the device. As a result, most have either no authentication or weak authentication, like passwords that can be easily sniffed from the wire. “Second, connectivity between corporate IT networks and OT networks has increased significantly because of the need to get real-time intelligence from production. Whether it’s a gas pipeline, a factory floor, or a well site, companies want to optimize their operations and collect real-time intelligence. This means that the attack surface has increased: There are many more ways for attackers to get into industrial networks. “Third, the group of potential attackers has also increased. From a destructive malware point of view, today, it includes nation-state threats, primarily Russia, North Korea, and Iran. Also China, which is less interested in malware and more interested in stealing intellectual property from industrial networks. Attackers now include sophisticated nation-states, cybercriminals with ransomware for shutting down a plant, and hacktivists. They also include third-party risks.” EE Times interviewed a host of cybersecurity experts for this Special Project. In the following pages, we will share some of the key points that they laid out for us as to why the IIoT is so vulnerable to cyberattacks ![]() |
![]() |
![]() |
![]() |
More Blogs from Ann R. Thryft
Major changes are happening in the world of 3D printing and additive manufacturing materials, machines, and software. If the industry -- and the design engineers and OEMs it serves -- are to grow, all three areas must become much more tightly integrated.
HP's industry-changing 3D printing announcement for commercial-scale end-production wasn't the only news of note at RAPID 2016 this week. Here are six more game-changing software and hardware news items, plus some videos explaining HP's technology.
With an eye toward building space-qualified radio-frequency components for Earth observation and science instruments, the European Space Agency has 3D printed a satellite antenna designed as a single part.
What are humanoid robots? Most of them sort into two general categories. This time, we'll look at obviously mechanical objects shaped like people, like the earlier Terminator models before SkyNet wised up and made them look like Ahnald.
EBN Newswire
EBN Dialogue / LIVE CHAT
![]() EBN Dialogue enables you to participate in live chats with notable leaders and luminaries. Open to the entire EBN community of electronics supply chain experts, these conversations see ideas shared, comments made, and questions asked and answered in real time. Listed below are upcoming and archived chats. Stay tuned and join in!
Archived Dialogues
![]() Live Chat 01/15: CPOs Re-Shape Their Business Roles
Increasingly chief procurement officers (CPOs) are re-shaping their organizational role to focus on creating results far beyond cost controls. A new IBM survey explores how. ![]() Live Chat 11/12: Examining the Cyberthreat to Supply Chains
The number of cyberattacks is on the rise and hackers are targeting the supply chain. Drew Smith, founder and CEO of InfoArmor, will be on hand to discuss the reality of today's threat landscape and what to do about it. |
||
![]() |
||||||
![]() |
||||||
|
||||||
![]() |
||||||
![]() |
||||||
![]() |